Résultat de la recherche - hour

Cypheros TS-Doctor 1.2.100

Cypheros TS-Doctor 1.2.100 Version d'essai 20843 

Nombreux récepteurs satellite et câble modernes offrent la possibilité d'enregistrer des émissions de radio et de télévision par ce qu'on…

Cayo Policy Manager for Active Directory 1.0.1

Cayo Policy Manager for Active Directory 1.0.1 Version gratuite 7699 

Cayo Policy Manager(tm) provides the missing layer of automated IT Policy and business rule enforcement for Active Directory (AD). Demanded…

File Access Scheduler 5.1292

File Access Scheduler 5.1292  5438 

Protect your files from being executed, viewed, changed and deleted. It will automatically enable a chosen protection based on currently…

SecurityPlus for MDaemon 4.1.2

SecurityPlus for MDaemon 4.1.2  6079 

Antivirus and spam protection for MDaemon Email Server. Provides real-time spam, Recurrent Pattern Detection Technology, Zero Hour Virus Outbreak Protection,…

Parental Control PRO 2.36

Parental Control PRO 2.36  5085 

Parental Control PRO is a stealth application that can secretly record information on your PC: records websites visited, usernames, passwords,…

Video Surveillance Monitor 3

Video Surveillance Monitor 3  4850 

Video Surveillance Monitor is an advanced video surveillance software. Users can effortlessly monitor home, office, cradle, parking area, storehouse, UFO…

Copysafe PDF Protection 3.0

Copysafe PDF Protection 3.0  4862 

CopySafe PDF provides the most secure copy protection for eBook and PDF documents and it is the only solution that…

Passware Encryption Analyzer Professional 4.3

Passware Encryption Analyzer Professional 4.3  4999 

Passware Encryption Analyzer is a free encryption scanning tool that finds password-protected or encrypted files on a PC. Are you…

Passware Encryption Analyzer 4.3

Passware Encryption Analyzer 4.3 Version gratuite 4672 

Passware Encryption Analyzer is a free encryption scanning tool that finds password-protected or encrypted files on a PC. Are you…

Trojan Killer 2.1.54

Trojan Killer 2.1.54  5468 

Once malware is detected, it is added to Trojan Killer database in 2-12 hours. Up-to-date databases and smart Trojan Killer’s…

1 Next » Last »